OpenVAS: Vulnerability Assessment Scanner

ChandrakTrivedi 5,993 views 64 slides Dec 25, 2016
Slide 1
Slide 1 of 64
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64

About This Presentation

Its an open source vulnerability scanner based on Nessus. Very useful in home and small scale companies to implement and check the system, network and devices vulnerabilities.


Slide Content

O peN VAS : Vulnerability Assessment Scanner By Chandrak Trivedi_101015275 Melbin Sunny_101013552 OpenVAS_Group4_Chandrak-Melbin 1

Learning Objective Understand the importance of Vulnerability Assessment (VA). Explain how OpenVAS is used for VA. Understand the logical architecture of OpenVAS framework. Conduct VA using OpenVAS. Evaluate the purpose and value of OpenVAS report. Determine how to mitigate vulnerabilities. OpenVAS_Group4_Chandrak-Melbin 2

Vulnerability Assessment (VA) What is Vulnerability Assessment (VA)? Why we n eed Vulnerability Assessment (VA)? RISK = ASSET * THREAT * VULNERABILITY OpenVAS_Group4_Chandrak-Melbin 3

OpenVAS_Group4_Chandrak-Melbin 4

OpenVAS Benefits Open Source and uses Nessus V2 as its plugin engine. Compatible with different Operating System. Keeps a history of past scans . Limitations False negatives may be reported. Determine/find less vulnerabilities as compared is Nexpose or Nessus. Requires 2-3 services to perform vulnerability assessment. OpenVAS_Group4_Chandrak-Melbin 5

An overview of OpenVAS The Open Vulnerability Assessment Scanner known more commonly as OpenVAS, is a suite of tools that work together to run tests against client computers using a database of known exploits and weaknesses. The goal is to learn about how well your servers are guarded against known attack vectors OpenVAS is be used as VULNERALABILITY ASSESSMENT tool and but also can be used as PENETRATION TESTING tool. OpenVAS_Group4_Chandrak-Melbin 6

OpenVAS Architecture Clients Services Data OpenVAS_Group4_Chandrak-Melbin 7

Clients Components OpenVAS CLI : is a set of tools that allow administration of OpenVAS through the shell. Greenbone Security Assistant : is a web-based tool with an intuitive interface for various VA that you are making. Greenbone Desktop Security : is the tool that allows us to manage everything through the GUI interface on the desktop. OpenVAS_Group4_Chandrak-Melbin 8

Services Components OpenVAS Scanner : is the component that allows us the scan of hostname/ ip , port range “from-to” or entire networks such as “192.168.1.0/28”. OpenVAS Manager : is the heart of OpenVAS , the manager receives task/information from the OpenVAS Administrator and the various administration tools CLI/WEB/GUI, then use the OpenVAS Scanner that will perform the Vulnerability Assessment. Also includes component that processes the results of the scans, so it also generates the final report . OpenVAS Administrator : is the component through which users can manage and the feed ( i.e. the updates). OpenVAS_Group4_Chandrak-Melbin 9

Data Components NVT’s : it is the container of feed , i.e. test cases that detect the vulnerabilities, which are currently over 20,000 . Results, config : is the database (PostgreSQL) where reports are collected and where the entire configuration of OpenVAS is stored. OpenVAS_Group4_Chandrak-Melbin 10

OpenVAS Feeds OpenVAS_Group4_Chandrak-Melbin 11

Conducting VA using OpenVAS OpenVAS_Group4_Chandrak-Melbin 12

Step 1: Setting up Kali for Vulnerability Scanning https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/ OpenVAS_Group4_Chandrak-Melbin 13

Step 1: Starting the OpenVAS services Once  openvas -setup  completes its process, the OpenVAS manager, scanner, and GSAD services should be listening : If you have already configured OpenVAS, you can simply start all the necessary services by running  openvas -start . OpenVAS_Group4_Chandrak-Melbin 14

Step 1: Connecting to the OpenVAS Web Interface Point your browser to  https://127.0.0.1:9392 , accept the self signed SSL certificate and plugin the credentials for the admin  user. The admin password was generated during the setup phase. OpenVAS_Group4_Chandrak-Melbin 15

OpenVAS_Group4_Chandrak-Melbin 16

Step 2: Tabs Explanation of Administration Tab - Adding Users, Groups and Roles. Updating Network Vulnerability Tests (NVTs), Security Content Automation P rotocol (SCAP) and Computer Emergency Response Team (CERT) Feeds. OpenVAS_Group4_Chandrak-Melbin 17

Administration tab OpenVAS_Group4_Chandrak-Melbin 18

Add New Users OpenVAS_Group4_Chandrak-Melbin 19

New User details OpenVAS_Group4_Chandrak-Melbin 20

NVT Feed OpenVAS_Group4_Chandrak-Melbin 21

Step 2: Tabs Explanation of Configuration tab - Targets, Port lists and Credentials Scan Config Alerts and Schedules Permissions OpenVAS_Group4_Chandrak-Melbin 22

Configuration tab OpenVAS_Group4_Chandrak-Melbin 23

Targets OpenVAS_Group4_Chandrak-Melbin 24

Port List OpenVAS_Group4_Chandrak-Melbin 25

Scan Configuration OpenVAS_Group4_Chandrak-Melbin 26

Permissions OpenVAS_Group4_Chandrak-Melbin 27

Step 2: Tabs Explanation of SecInfo Management tab - SecInfo Dashboard Network Vulnerability tests (NVTs) Common Vulnerabilities and Exposures (CVEs) OpenVAS_Group4_Chandrak-Melbin 28

SecInfo Management OpenVAS_Group4_Chandrak-Melbin 29

SecInfo Dashboard OpenVAS_Group4_Chandrak-Melbin 30

NVTs – Network Vulnerability test OpenVAS_Group4_Chandrak-Melbin 31

CVEs – Common Vulnerabilities and Exposure OpenVAS_Group4_Chandrak-Melbin 32

Step 2: Tabs Explanation of Scan Management - Tasks Reports Results OpenVAS_Group4_Chandrak-Melbin 33

Scan Management tab OpenVAS_Group4_Chandrak-Melbin 34

New Tasks OpenVAS_Group4_Chandrak-Melbin 35

Reports OpenVAS_Group4_Chandrak-Melbin 36

Results OpenVAS_Group4_Chandrak-Melbin 37

Step 3: Scanning Explanation for Scanning a Target to find Vulnerabilities. Procedures I: New Target (Creating Target) II: New Task (Creating Task) III: Scanning OpenVAS_Group4_Chandrak-Melbin 38

I. New Target OpenVAS_Group4_Chandrak-Melbin 39

Port List Options OpenVAS_Group4_Chandrak-Melbin 40

Target Added OpenVAS_Group4_Chandrak-Melbin 41

II. New Task OpenVAS_Group4_Chandrak-Melbin 42

Scan Config Options OpenVAS_Group4_Chandrak-Melbin 43

Task Created OpenVAS_Group4_Chandrak-Melbin 44

III. Start Scanning OpenVAS_Group4_Chandrak-Melbin 45

Total Task List OpenVAS_Group4_Chandrak-Melbin 46

Scanned Target Summary Report OpenVAS_Group4_Chandrak-Melbin 47

Results of Target OpenVAS_Group4_Chandrak-Melbin 48

Step 4: Export report of VA conducted Explanation on Exporting the scanned target vulnerabilities into file. Different extension are possible to export like .pdf, .xml etc. PDF will be used to submit to your higher management. XML can be used to import in Metasploit for doing pen testing. Also you can study by just clicking the vulnerability. OpenVAS_Group4_Chandrak-Melbin 49

Studying Vulnerability OpenVAS_Group4_Chandrak-Melbin 50

Exporting as file OpenVAS_Group4_Chandrak-Melbin 51

PDF file OpenVAS_Group4_Chandrak-Melbin 52

Exploitation on V ulnerable S ystem Using NVTs, CVEs and Metasploit Video on Denial of Service (DOS) on scanned results. OpenVAS_Group4_Chandrak-Melbin 53

Windows XP – No Firewall and Updates OpenVAS_Group4_Chandrak-Melbin 54

Windows XP - No Firewall and Updates OpenVAS_Group4_Chandrak-Melbin 55

VA OpenVAS_Group4_Chandrak-Melbin 56

Metasploit OpenVAS_Group4_Chandrak-Melbin 57

Metasploit OpenVAS_Group4_Chandrak-Melbin 58

OpenVAS_Group4_Chandrak-Melbin 59

Step 5: Mitigation As per references provided by OpenVAS, Patching the updates and Firewall protected. OpenVAS_Group4_Chandrak-Melbin 60

Windows XP – Firewall and Auto Updates OpenVAS_Group4_Chandrak-Melbin 61

VA OpenVAS_Group4_Chandrak-Melbin 62

Metasploit OpenVAS_Group4_Chandrak-Melbin 63

OpenVAS_Group4_Chandrak-Melbin 64 Question ???